Home CV/Resume Books Litigation Support Contact Teaching  

This segment of the website is to provide a list of research papers that reference my work, his own research papers, and other information regarding places where my work has had some impact.

My books and articles have been referenced by numerous computer scientists, including several Ph.D. dissertations.  A few of those references are included here:

1. An assessment of user response to phishing attacks: the effects of fear and self-confidence by Deanna House, Ph.D. Dissertation in Information Systems, University of Texas Arlington.
2. Reference Model Based High Fidelity Simulation Modeling For Manufacturing Systems by Hansoo Kim Ph.D. Dissertation, School of Industrial and Systems Engineering Georgia Institute of Technology.
3. Leadership Styles and Information Security In Small Businesses: An Empirical Investigation by Debasis Bhattachary, Ph.D. Dissertation, University of Phoenix.
4. A cryptographically-based operating system security model that protects against privileged attackers. By Christian Pain Ph.D. Dissertation Murdoch University School of Information Technology
5. The adoption of business-to-business systems by small and medium enterprises in Amman and the perceptions of its influence on performance and efficiency by Anals A. AlBakry, Ph.D. Dissertation, University of Southern Queensland.
6. MODELS, SERVICES AND SECURITY IN MODERN ONLINE SOCIAL NETWORKS, Ph.D. dissertation of Alessio Bonti Deakin University, Australia.
7. Design of a Forensic Overlay Model for Application Development Linlin Ke, Master’s Thesis, College of Engineering, University of Canterbury.
8. Forensic Analysis of Linux Physical Memory: Extraction and Resumption of Running Processes. ED Mougoue, Master’s Thesis, James Madison University.
9. Motivations behind Software Piracy: From the viewpoint of Computer Ethics Theories. Bethelhem Tadele Masters Thesis University of Oulu (Scandinavia).
10. Hackers, spies, and stolen secrets: protecting law firms from data theft by Alan W. Ezekiel. Harvard Journal of Law & Technology Volume 26, Number 2 Spring 2013Taming the diversity of information assurance & security - Journal of Computing Sciences in Colleges Volume 23, Issue 4 (April 2008) J. Paul Myers, Sandra Riela.
11. Adding information assurance to the curriculum - Journal of Computing Sciences in Colleges Volume 22, Issue 2 (December 2006) Richard Weiss.
12. Effect of Windows XP Firewall on Network Issues in Informing Science and Information Technology Volume 4, 2007 Al-Rawi(King Faisal University Saudi Arabia) ,Lansari (Zayed University UAE).
13. Assessing Risks of Policies to Patch Software Vulnerabilities Radianti, Sveen, and Gonzalez.
14. A study of efficient avoidance in the event of DNS(domain name system) failure - Proceedings of the 8thConference on 8th WSEAS International Conference on Automation and Information - Volume 8 Lin, Hwang, Lin.
15. Embracing the Diversity of Information Assurance & Security - Myers
16. A study of efficient avoidance in the event of DNS (domain name system) failure -Yang, Hyon, and Hankyu.
17. Social and Organizational Aspects of Information Security Management -K. Michael.
18. The Problems and Policy Alternatives for Cyber Security in the Networking Age by Lee Ki Shik.
19. Securing Small Business: - The Role of Information Technology Policy. Batten and Castleman.
20. The Impact of Virtual Private Network (VPN) on a Company's Network. Powell, J.M.
21. Thinking Globally: Incorporating an International Component in Information Security Curricula. Kiswani and Al-Bakari.
22. Security, ethics and electronic commerce systems: cybercrime and the need for information sharing security White and Long.
23. The Expanded Risk Horizon of Accounting Networks Utilizing Wireless Technology - David R. Fordham -AIS Educator Journal Volume: 4 Issue: 1 2009.
24. Researches on the IPv6 Network safeguard linked system - Ma Yue, Lian Hong, and Zhang Xiao Feng- Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference 2010.
25. Migration from Microsoft to Linux on Servers and Desktops. –Kumar.
26. Decision making process in migration from Microsoft to Linux –Kumar.
27. Automatic Generation of Intelligent JavaScript Programs for Handling Input Forms in HTML Documents Suzuki and Tokuda Dept. of Comp. Science, Tokyo Inst. of Tech.
28. Influence of copyrights over the relationships in elearning Ivan Pogarcic, Marko Pogarcic, Matej Pogarcic Polytechnic of Rijeka, University of Rijeka, Faculty of Law, University of Ljubljana.
29. Using Whois Based Geolocation and Google Maps API for support cybercrime investigations, Asmir Butkovic et. al.
30. Odyssey of Data Security With A New Perception. Ankita & Lavisha
31. Cyber Law: Approach to Prevent Cyber Crime. M Verma, SA Hussain, SS Kushwah.
32. The Internet-EDI Systems Adoption by Enterprises in Jordan: Descriptive Analysis of Adoption, Strategies and Benefits by Anas Al Bakri International Journal of Internet and Distributed Systems.
33. Encryption Protocol using some Pieces of Message as Key by S. Prakancharoen - International Journal of Applied Computer Technology.
34. A Patient Privacy Protection Scheme for Medical Information System by by Lu, Wu, Liu, Chen, and Guo. Journal of Medical Systems October 2013.
35. A study of information security awareness and practices in Saudi Arabia by Alarifi, A.; SISAT, Univ. of Wollongong, Wollongong, NSW, Australia. doi: 10.1109/ICCITechnol.2012.6285845.
36. Secure login by using One-time Password authentication based on MD5 Hash encrypted SMS by Sediyono, E.; Satya Wacana Christian Univ., Salatiga, Indonesia; Santoso, K.I. ; Suhartono. doi: 10.1109/ICACCI.2013.6637420.
37. Design and Implementation of a Virtual Calculation Centre (VCC) for Engineering Students, by Alaeddine. Published in International Journal of Online Engineering. 2010, Vol. 6 Issue 1, p18-23.
38. Artificial Intelligence Tool and Electronic Systems Used to Develop Optical Applications, By Tecpoyotl-Torres et. al. Chapter 10 in the book Advances in Lasers and Electro Optics
39. The entry on ‘computer crime and security’ in the Encyclopedia of Computer Science and Technology cites my Computer Security Fundamentals textbook.
40. University of British Columbia Law Review "In Plain View R V Jones and the Challenge of Protecting Privacy in an era of computer search"
41. "Researches on the IPv6 Network safeguard linked system" Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on (Volume:7 ).
42. The Criminalization of Identity Theft under the Saudi Anti-Cybercrime Law 2007 Journal of International Commercial Law and Technology vol 9, no2 by Suhail Almerdas.
43. An Optimized and Secured VPN with Web Service Networking and Communication Engineering vol 6, No2; by A. Balasubramanian, A. Hemanth Kumar, R. Prasanna Venkatesan.
44. FACTORS AFFECTING THE IMPLEMENTATION OF MANAGEMENT INFORMATION SYSTEM IN SELECTED FINANCIAL COOPERATIVES IN NAIROBI Published in the International Journal of Social Sciences and Project Planning Management, Vol 1, Issue 2, 2014.



 

     

     

    Universities using my books

    A number of colleges and universities around the world have used, or are using one or more of my books as textbooks.  Below is an exemplary sample of some of those universities.

    1. Auburn University
    2. University Of Oklahoma
    3. Arizona Western College
    4. Kent State University Ohio
    5. Pennsylvania State University
    6. University Of Nebraska
    7. University of North Dakota
    8. Western Illinois University
    9. University Of South Carolina
    10. Florida State University
    11. East Tennessee State University
    12. University Of The Incarnate Word
    13. Midwestern State University
    14. University Of S Carolina-Lancaster
    15. Southeast Missouri State University
    16. George Mason University
    17. Queen’s College New York
    18. American Military University
    19. Columbus State University
    20. Texas Christian University
    21. Illinois Institute of Technology
    22. Rochester Institute of Technology
    23. Wentworth Institute of Technology
    24. Western Nevada College
    25. Florida State College
    26. College Of So Nevada-Cheyenne
    27. College Of S Nevada-W Charleston
    28. University of Dhaka (Bangladesh)
    29. Kurukshetra University (India)
    30. Universiti Malaysia Sarawak (Malaysia)
    31. Trinity College of Puerto Rico
    32. Technological Institute of the Phillipines
    33. Nigeria University


     

    In addition some of my books have been translated into additional languages including German, Korean, and Mandarin.